History log of /netbsd-src/sys/netinet/tcp_output.c (Results 26 – 50 of 222)
Revision Date Author Comments
# 8be5cabc 03-Aug-2017 ozaki-r <ozaki-r@NetBSD.org>

Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future

KEY_SA_UNREF is still key_freesav so no functional change for now.

This change reduces di

Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future

KEY_SA_UNREF is still key_freesav so no functional change for now.

This change reduces diff of further changes.

show more ...


# 4ce45a79 02-Jun-2017 ozaki-r <ozaki-r@NetBSD.org>

Assert inph_locked on ipsec_pcb_skip_ipsec (was IPSEC_PCB_SKIP_IPSEC)

The assertion confirms SP caches are accessed under inph lock (solock).


# 2495e7a0 03-Mar-2017 ozaki-r <ozaki-r@NetBSD.org>

Pass inpcb/in6pcb instead of socket to ip_output/ip6_output

- Passing a socket to Layer 3 is layer violation and even unnecessary
- The change makes codes of callers and IPsec a bit simple


# 68f5a347 04-Jan-2017 martin <martin@NetBSD.org>

Fix optlen calculation for the SACK block - 2 bytes too few were
calculated, causing corruption in PR kern/51767.


# c6fa5aa9 04-Jan-2017 kre <kre@NetBSD.org>

Remove redundant tests: if optlen === 0, then optlen % 4 != 2 (it is 0)
so there is no need to test both.


# 106cdf03 03-Jan-2017 christos <christos@NetBSD.org>

use symbolic constants; no functional change.


# 0a91c122 03-Jan-2017 christos <christos@NetBSD.org>

put it the way we had it before; since we check for the resulting size after
we added the extra space we can be equal to the size of the buffer.


# 9a6f404c 03-Jan-2017 christos <christos@NetBSD.org>

fix off-by-one


# 5e3bbad5 02-Jan-2017 christos <christos@NetBSD.org>

make sure that the reset label is defined without TCP_SIGNATURE.


# 65dfd4cc 02-Jan-2017 christos <christos@NetBSD.org>

Fix TCP signature code:
1. pack options more tightly instead of being generous with no/op
2. put TCP_SIGNATURE option before SACK
3. fix computation of options length, by deferring it
XXX: Really we

Fix TCP signature code:
1. pack options more tightly instead of being generous with no/op
2. put TCP_SIGNATURE option before SACK
3. fix computation of options length, by deferring it
XXX: Really we should move the options setting code in one place instead
of having two copies one for input and one for output.
XXX: tcp_optlen/tcp_hdrsiz need to be fixed; they were wrong before too.

show more ...


# 4c25fb2f 08-Dec-2016 ozaki-r <ozaki-r@NetBSD.org>

Add rtcache_unref to release points of rtentry stemming from rtcache

In the MP-safe world, a rtentry stemming from a rtcache can be freed at any
points. So we need to protect rtentries somehow say b

Add rtcache_unref to release points of rtentry stemming from rtcache

In the MP-safe world, a rtentry stemming from a rtcache can be freed at any
points. So we need to protect rtentries somehow say by reference couting or
passive references. Regardless of the method, we need to call some release
function of a rtentry after using it.

The change adds a new function rtcache_unref to release a rtentry. At this
point, this function does nothing because for now we don't add a reference
to a rtentry when we get one from a rtcache. We will add something useful
in a further commit.

This change is a part of changes for MP-safe routing table. It is separated
to avoid one big change that makes difficult to debug by bisecting.

show more ...


# d938d837 10-Jun-2016 ozaki-r <ozaki-r@NetBSD.org>

Introduce m_set_rcvif and m_reset_rcvif

The API is used to set (or reset) a received interface of a mbuf.
They are counterpart of m_get_rcvif, which will come in another
commit, hide internal of rcv

Introduce m_set_rcvif and m_reset_rcvif

The API is used to set (or reset) a received interface of a mbuf.
They are counterpart of m_get_rcvif, which will come in another
commit, hide internal of rcvif operation, and reduce the diff of
the upcoming change.

No functional change.

show more ...


# 1c4a50f1 24-Aug-2015 pooka <pooka@NetBSD.org>

sprinkle _KERNEL_OPT


# 49cb8763 24-Jul-2015 matt <matt@NetBSD.org>

If we are sending a window probe and there's unacked data in the socket, make
sure at least the persist timer is running.


# a6fab821 16-May-2015 kefren <kefren@NetBSD.org>

Don't put segment on the wire if security request can't be fulfilled


# ffe2b84e 27-Apr-2015 christos <christos@NetBSD.org>

Apply Revision 220794 from FreeBSD to avoid dup ACKs:

When checking to see if a window update should be sent to the remote peer,
don't force a window update if the window would not actually grow due

Apply Revision 220794 from FreeBSD to avoid dup ACKs:

When checking to see if a window update should be sent to the remote peer,
don't force a window update if the window would not actually grow due to
window scaling. Specifically, if the window scaling factor is larger than
2 * MSS, then after the local reader has drained 2 * MSS bytes from the
socket, a window update can end up advertising the same window. If this
happens, the supposed window update actually ends up being a duplicate ACK.
This can result in an excessive number of duplicate ACKs when using a
higher maximum socket buffer size.

Pointed out by Ricky Charlet, in tech-net.

show more ...


# 2373b55a 27-Apr-2015 ozaki-r <ozaki-r@NetBSD.org>

Introduce in6_selecthlim_rt to consolidate an idiom for rt->rt_ifp

It consolidates a scattered routine:
(rt = rtcache_validate(&in6p->in6p_route)) != NULL ? rt->rt_ifp : NULL


# 1d14d022 14-Feb-2015 he <he@NetBSD.org>

Port over the TCP_INFO socket option from FreeBSD, originally from
the Linux 2.6 TCP API. This permits the caller to query certain information
about a TCP connection, and is used by pkgsrc's net/ipe

Port over the TCP_INFO socket option from FreeBSD, originally from
the Linux 2.6 TCP API. This permits the caller to query certain information
about a TCP connection, and is used by pkgsrc's net/iperf3 test program
if available.

This extends struct tcbcb with three fields to count retransmits,
out-of-sequence receives and zero window announcements, and will
therefore warrant a kernel revision bump (done separately).

show more ...


# fcc99ce6 10-Nov-2014 maxv <maxv@NetBSD.org>

Do not uselessly include <sys/malloc.h>.


# 828d2742 25-Oct-2014 christos <christos@NetBSD.org>

Avoid stack overflow when SACK and TCP_SIGNATURE are both present. Thanks
to Jonathan Looney for pointing this out.


# 62fa1e32 21-Oct-2014 hikaru <hikaru@NetBSD.org>

Fix wrong condition checking TSO capability.
ipsec_used is not necessary condition.
IPsec outbound policy will not be checked when ipsec_used is false.


# 5d61e6c0 30-May-2014 christos <christos@NetBSD.org>

Introduce 2 new variables: ipsec_enabled and ipsec_used.
Ipsec enabled is controlled by sysctl and determines if is allowed.
ipsec_used is set automatically based on ipsec being enabled, and
rules ex

Introduce 2 new variables: ipsec_enabled and ipsec_used.
Ipsec enabled is controlled by sysctl and determines if is allowed.
ipsec_used is set automatically based on ipsec being enabled, and
rules existing.

show more ...


# 27fe772d 05-Jun-2013 christos <christos@NetBSD.org>

IPSEC has not come in two speeds for a long time now (IPSEC == kame,
FAST_IPSEC). Make everything refer to IPSEC to avoid confusion.


# 364a06bb 22-Mar-2012 drochner <drochner@NetBSD.org>

remove KAME IPSEC, replaced by FAST_IPSEC


# 42c42085 31-Dec-2011 christos <christos@NetBSD.org>

- fix offsetof usage, and redundant defines
- kill pointer casts to 0


123456789